Monthly Archives: July 2014

I’m going to assert that Sam is the second greatest security you face. (We will encounter the greatest thread in a few more posts.) Depending on who you talk to, between 60% and 90% of corporate losses due to theft … Continue reading →

No discussion of system integrity and security would be complete without Tom. Without the applications, tools, and utilities that Tom writes, computers would be nothing but expensive space heaters. Software, especially applications software, is the reason computers exist. Tom is … Continue reading →

In terms of threat potential, Fred is off the charts. In order to do his job, he has essentially uncontrolled access to all computer resources. Fred can damage software and data in obvious or subtle ways. He can wipe out … Continue reading →

William is concerned with his group getting their job done. He is under budget pressure, time pressure, and requirements to deliver. William is a good manager – he is concerned for his people and dedicated to removing obstacles that get … Continue reading →

What?!? The security guy is listed as a threat to system security? Absolutely. Stan is knowledgeable. He knows that the world is filled with evil. And he is determined to protect his company from it. There is a famous saying: … Continue reading →

An interesting question just came up: “is there a Java binding for LMIShell?” Hmm, good question – let’s answer it by digging into the OpenLMI architecture a bit. LMIShell is a client framework written in Python. It consists of a … Continue reading →

Sphinx the Script Kiddie Unlike Igor, Sphinx doesn’t have deep skills or knowledge. But he does have access to very powerful cracking toolkits that other people have developed and to people who can provide guidance and answer questions. This makes … Continue reading →